Skip to main content

OpenSecurityTraining.info

In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long.



rss RSS

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
OpenSecurityTraining.info
movies
eye 34,780
favorite 10
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 13,976
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 10,217
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 9,503
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 9,009
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 8,222
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 8,076
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 7,567
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Mike McFail & Ben Actis
movies
eye 7,169
favorite 0
comment 0
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.html Follow us on Twitter for class news @OpenSecTraining . This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational...
Topics: OpenSecurityTraining.info, network security, netflow, flow analysis, netflow analysis, network...
OpenSecurityTraining.info
movies
eye 7,156
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 6,957
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 6,712
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 6,686
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Intel processors have been a major force in personal computing for more than 20 years. An understanding of low level computing mechanisms used in Intel chips as taught in this course serves as a foundation upon which to better understand other hardware, as well as many technical specialties such as reverse engineering, compiler design, operating system design, code optimization, and vulnerability exploitation....
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Gananand Kini
movies
eye 6,178
favorite 1
comment 0
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand,...
Topics: OpenSecurityTraining.info, ARM, Acorn RISC Machine, Advanced RISC Machine, assembly, disassembly,...
OpenSecurityTraining.info
movies
eye 5,766
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 5,639
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 5,039
favorite 4
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Corey K.
movies
eye 4,985
favorite 0
comment 0
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here: http://archive.org/details/Day1Part1IntroductionToSoftwareExploits http://opensecuritytraining.info/Exploits1.html
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
by Veronica Kovah
movies
eye 4,953
favorite 0
comment 0
Get the class materials to follow along at http://www.opensecuritytraining.info/MalwareDynamicAnalysis.html Follow us on Twitter for class news @OpenSecTraining . This introductory malware dynamic analysis class by Veronica Kovah is dedicated to people who are starting to work on malware analysis or who want to know what kinds of artifacts left by malware can be detected via various tools. The class will be a hands-on class where students can use various tools to look for how malware is:...
Topics: OpenSecurityTraining.info, Reverse Engineering, Malware, Malware Analysis, Dynamic Analysis,...
OpenSecurityTraining.info
movies
eye 4,767
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 4,759
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 4,716
favorite 2
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 4,713
favorite 2
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Mike McFail & Ben Actis
movies
eye 4,650
favorite 0
comment 0
This is the Ubuntu Linux VM that can be used for doing labs associated with the class here: https://archive.org/details/FlowAnalysisP1Intro http://opensecuritytraining.info/Flow.html
Topics: OpenSecurityTraining.info, network security, netflow, flow analysis, netflow analysis, network...
OpenSecurityTraining.info
movies
eye 4,019
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,970
favorite 2
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,599
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,546
favorite 1
comment 0
Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a multilevel paging system. We will also talk about memory segmentation. •The...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,451
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,323
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,317
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,315
favorite 1
comment 0
Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through a multilevel paging system. We will also talk about memory segmentation. •The...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 3,095
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 3,071
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,057
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,036
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 3,016
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,969
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,943
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,941
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,924
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,910
favorite 1
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining . Have you ever wondered what happens when a C program is compiled and executed on a system? This three-day class by Xeno Kovah will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: *Scanning and tokenizing source code. *Parsing a grammar...
Topics: OpenSecurityTraining.info, Computer security class, security, Computer Security, Cyber Security,...
OpenSecurityTraining.info
movies
eye 2,908
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,908
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,907
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,840
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,832
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,819
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,806
favorite 2
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,798
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
movies
eye 2,797
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,796
favorite 1
comment 0
More information about this class material is available at OpenSecurityTraining.info Building upon the Introductory Intel x86 class (click the OpenSecurityTraining.info tag to find it), this class goes into more depth on topics already learned, and introduces more advanced topics that dive deeper into how Intel-based systems work. Topics include, but are not limited to: •Physical and virtual memory and how a limited amount of physical memory is represented as much more virtual memory through...
Topics: Intel, x86, Intel x86, IA32, training, education, multi-day-class, multi-day-training, classes,...
OpenSecurityTraining.info
movies
eye 2,790
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,786
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToSoftwareExploits.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.opensecuritytraining.info/ChangeBlog/ChangeBlog.html Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit...
Topics: OpenSecurityTraining.info, Exploits, software vulnerabilities, buffer overflows, smashing the...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,611
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,609
favorite 0
comment 0
Get the class materials to follow along at http://OpenSecurityTraining.info/WebIdentity.html Follow us on Twitter for class news @OpenSecTraining . This course by Zak Zebrowski looks at web users from a few different perspectives.  First, we look at identifying techniques to determine web user identities from a server perspective.  Second, we will look at obfuscating techniques from a user whom seeks to be anonymous.  Finally, we look at forensic techniques, which, when given a hard drive or...
Topics: opensecuritytraining.info, privacy, web privacy, browser privacy, email privacy, anonymization,...
OpenSecurityTraining.info
movies
eye 2,601
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,588
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,584
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies
eye 2,553
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,540
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,533
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
by Xeno Kovah
movies
eye 2,530
favorite 1
comment 0
Have you ever wondered what happens when a C program is compiled and executed on a system? This class will investigate the life of a binary from birth as C source code to death as a process running in memory being terminated. Topics will include but are not limited to: • Scanning and tokenizing source code. • Parsing a grammar and outputting assembly code. • Different targets for x86 assembly object files generation. (E.g. relocatable vs. position independent code). • Linking object...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,455
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies
eye 2,452
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
by Gananand Kini
movies
eye 2,390
favorite 0
comment 0
Class materials at http://www.OpenSecurityTraining.info/IntroARM.html Follow us on Twitter for class news @OpenSecTraining. ARM processors are becoming ubiquitous in mobile devices today with RISC processors making a comeback for their applications in low power computing environments. With major operating systems choosing to run on these processors including the latest Windows RT, iOS and Android, understanding the low level operations of these processors can serve to better understand,...
Topics: OpenSecurityTraining.info, ARM, Acorn RISC Machine, Advanced RISC Machine, assembly, disassembly,...
OpenSecurityTraining.info
movies
eye 2,329
favorite 1
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
movies
eye 2,300
favorite 1
comment 0
More information, and the class materials for this class and others is available at www.OpenSecurityTraining.info. It is strongly recommended to take the Introductory Intel x86, Intermediate Intel x86, and Life of Binaries before this class. To find the prerequisite class videos, click the OpenSecurityTraining.info tag. Rootkits are a type of malware which are dedicated to hiding the attacker’s presence on a compromised system. This class will focus on understanding how rootkits work, and...
Topics: training, education, multi-day-class, multi-day-training, classes, computer security class,...
OpenSecurityTraining.info
by Mike McFail & Ben Actis
movies
eye 2,291
favorite 0
comment 0
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.html Follow us on Twitter for class news @OpenSecTraining . This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational...
Topics: OpenSecurityTraining.info, network security, netflow, flow analysis, netflow analysis, network...
OpenSecurityTraining.info
movies
eye 2,279
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/ReverseEngineeringMalware.html Follow us on Twitter for class news @OpenSecTraining . An email arrives in your inbox: "You have to check out this picture!" It came from your friends address, which you know and trust. It beckons you to open it. Maybe you weren't fooled this time, but it's likely at least one of the 50 other recipients couldn't resist. As we store more of our confidential information on our...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, Malware, Malware Analysis, Static...
OpenSecurityTraining.info
movies
eye 2,260
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,246
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...
OpenSecurityTraining.info
movies
eye 2,235
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
movies
eye 2,224
favorite 0
comment 0
The class materials are available at http://www.OpenSecurityTraining.info/Exploits2.html Follow us on Twitter for class news @OpenSecTraining. This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such...
Topics: OpenSecurityTraining.info, Exploits, Vulnerabilities, software vulnerabilities, buffer overflows,...
OpenSecurityTraining.info
movies
eye 2,218
favorite 0
comment 0
Get the class materials to follow along at http://www.OpenSecurityTraining.info/IntroductionToReverseEngineering.html Follow us on Twitter for class news @OpenSecTraining or via RSS at http://www.OpenSecurityTraining.info/ChangeBlog/ChangeBlog.html Throughout the history of invention curious minds have sought to understand the inner workings of their gadgets. Whether investigating a broken watch, or improving an engine, these people have broken down their goods into their elemental parts to...
Topics: OpenSecurityTraining.info, Disassembly, Reverse Engineering, IDA, IDA Pro, Debugging, Intel x86,...